


Perceptive Security
SOC/SIEM Consultancy

Tinyauth is an authentication and authorization server. Prior to version 5.0.5, all three OAuth service implementations (GenericOAuthService, GithubOAuthService…
Published:
1 april 2026 om 22:00:00
Alert date:
2 april 2026 om 16:03:28
Source:
nvd.nist.gov
Identity & Access, Web Technologies
Tinyauth authentication server prior to version 5.0.5 contains a critical race condition vulnerability in OAuth service implementations. All three OAuth services (GenericOAuthService, GithubOAuthService, GoogleOAuthService) store PKCE verifiers and access tokens as mutable struct fields on singleton instances shared across concurrent requests. When two users simultaneously initiate OAuth login for the same provider, a race condition between VerifyCode() and Userinfo() functions causes identity confusion, where one user receives a session with another user's identity. This represents a severe authentication bypass vulnerability that could lead to unauthorized access and account takeover. The issue has been patched in version 5.0.5.
Technical details
Mitigation steps:
Affected products:
Tinyauth
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-33544
https://github.com/steveiliop56/tinyauth/commit/f26c2171610d5c2dfbba2edb6ccd39490e349803
https://github.com/steveiliop56/tinyauth/releases/tag/v5.0.5
https://github.com/steveiliop56/tinyauth/security/advisories/GHSA-9q5m-jfc4-wc92
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
